Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2024-2387

Опубликовано: 02 мая 2024
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2024-2387: mod_jk and mod_proxy_cluster security update (MODERATE)

mod_jk [1.2.49-1]

  • Related: RHEL-27511 - Rebase to upstream 1.2.49 release

mod_proxy_cluster [1.3.20-1]

  • Rebase mod_cluster to upstream 1.3.20.Final tag
  • Related: RHEL-27497 - Rebase to upstream 1.3.20.Final release

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

mod_jk

1.2.49-1.el9_4

mod_proxy_cluster

1.3.20-1.el9_4

Oracle Linux x86_64

mod_jk

1.2.49-1.el9_4

mod_proxy_cluster

1.3.20-1.el9_4

Связанные CVE

Связанные уязвимости

CVSS3: 5.4
redhat
больше 1 года назад

A flaw was found in the mod_proxy_cluster in the Apache server. This issue may allow a malicious user to add a script in the 'alias' parameter in the URL to trigger the stored cross-site scripting (XSS) vulnerability. By adding a script on the alias parameter on the URL, it adds a new virtual host and adds the script to the cluster-manager page.

CVSS3: 5.4
nvd
больше 1 года назад

A flaw was found in the mod_proxy_cluster in the Apache server. This issue may allow a malicious user to add a script in the 'alias' parameter in the URL to trigger the stored cross-site scripting (XSS) vulnerability. By adding a script on the alias parameter on the URL, it adds a new virtual host and adds the script to the cluster-manager page.

CVSS3: 5.4
debian
больше 1 года назад

A flaw was found in the mod_proxy_cluster in the Apache server. This i ...

CVSS3: 7.5
ubuntu
почти 2 года назад

Important: Authentication Bypass CVE-2023-41081 The mod_jk component of Apache Tomcat Connectors in some circumstances, such as when a configuration included "JkOptions +ForwardDirectories" but the configuration did not provide explicit mounts for all possible proxied requests, mod_jk would use an implicit mapping and map the request to the first defined worker. Such an implicit mapping could result in the unintended exposure of the status worker and/or bypass security constraints configured in httpd. As of JK 1.2.49, the implicit mapping functionality has been removed and all mappings must now be via explicit configuration. Only mod_jk is affected by this issue. The ISAPI redirector is not affected. This issue affects Apache Tomcat Connectors (mod_jk only): from 1.2.0 through 1.2.48. Users are recommended to upgrade to version 1.2.49, which fixes the issue. History 2023-09-13 Original advisory 2023-09-28 Updated summary

CVSS3: 7.5
redhat
почти 2 года назад

Important: Authentication Bypass CVE-2023-41081 The mod_jk component of Apache Tomcat Connectors in some circumstances, such as when a configuration included "JkOptions +ForwardDirectories" but the configuration did not provide explicit mounts for all possible proxied requests, mod_jk would use an implicit mapping and map the request to the first defined worker. Such an implicit mapping could result in the unintended exposure of the status worker and/or bypass security constraints configured in httpd. As of JK 1.2.49, the implicit mapping functionality has been removed and all mappings must now be via explicit configuration. Only mod_jk is affected by this issue. The ISAPI redirector is not affected. This issue affects Apache Tomcat Connectors (mod_jk only): from 1.2.0 through 1.2.48. Users are recommended to upgrade to version 1.2.49, which fixes the issue. History 2023-09-13 Original advisory 2023-09-28 Updated summary